Accepted Papers
ISIICT 2009
Third International Symposium on Innovation in Information & Communication Technology
15 - 17 December, 2009, Philadelphia University, Amman, Jordan
http://www.philadelphia.edu.jo/isiict2009
#52. Applying Packets Meta data for Web Usage Mining. Alaa H. AL-Hamami, Mohammad A. AL-Hamami, and Soukaena H. Hashem (Amman Arab University for Graduate Studies, Amman, Jordan)
#54. Derivation of an Analytical Model for Evaluating the Performance of a Multi-Queue Nodes Network Router. Hussein Al-Bahadili and Jafar Ababneh (The Arab Academy for Banking & Financial Sciences, Amman, Jordan), and Fadi Thabtah (Philadelphia University, Amman, Jordan)
#58. Performance evaluation of generic deployment platform for component based applications using graph theory. Benamar Abdelkrim (University of Tlemcen, Algeria), Belkhatir Noureddine (University of Grenoble, France), and Bendimerad Fethi Tarik (University of Tlemcen, Algeria)
#68. Data based ontology construction coupled to expert system for steam turbine aided diagnostic. Klai Sihem (University 20 Aout 55, Skikda, Algeria) and Khadir Med Tarek (University of Badji Mokhtar of Annaba, Algeria)
#74. Validating the IS-Impact Model at Queensland University of Technology (QUT): Part A. Ahmad A. Rabaa'I (Queensland University of Technology, Australia)
# 78. Modeling and Verification of Real-Time Embedded Systems. Mustapha Bourahla (University of Biskra, Algeria)
#80. Exploiting P-invariant Analysis for Distributed Systems Diagnosis based on Interacting Behavioral Petri Nets. Hammadi Bennoui (University of Biskra, Algeria), Allaoua Chaoui (University of Constantine, Algeria), and Kamel Barkaoui (CNAM, Paris, France)
#83. Security Measures in Wired and Wireless Networks. Anthony C. Ijeh, Allan J. Brimicombe, David S. Preston, and Chris Imafidon (University of East London, UK)
#85. A Multi-Agent System for Image Segmentation: A Bio-Inspired Approach. Safia Djemame, Mabrouk Nekkache (Ferhat Abbas University, Setif, Algeria) and Mohammed Batouche (CCIS-King Saud University, Riyadh, Saudi Arabia)
#86. Applying E-marketing Methodologies In The Mobile Industry: The Case of Orange – Jordan. Rania A. Bakeir and Emad Abu-Shanab (Yarmouk University, Jordan) and Shadi Al Biss (Orange Telecom Group, Jordan)
#90. G2C Acceptance in Malaysia: Trust, Perceived Risk and Political Efficacy. Ramlah Hussein, Norshidah Mohamed, Abdul Rahman Ahlan, Murni Mahmud and Umar Aditiawarman (International Islamic University, Malaysia)
#91. WS-UML: a UML profile for web service applications. Dhikra Kchaou, Nadia Bouassida, and Hanene Ben-Abdallah (Sfax University, Tunisia)
#94. Identifying critical success factors of ERP systems at the higher education sector. Ahmad A. Rabaa'I (Queensland University of Technology, Australia)
#99. Software Evolution and Natural Processes: A Taxonomy of Approaches. Djamel Meslati, Labiba Souici-Meslati , and Seifeddine Mili (Badji Mokhtar University, Annaba, Algeria)
#101. Design improvement through dynamic and Structural pattern identification. Nadia Bouassida, and Hanene Ben-Abdallah (Sfax University, Tunisia)
#103. Combining Evidence with Logic and Preferences to Learn Relations from Structured Few Sparse Textual Data. Nadia Zerida and Khaldoun Zreik (Paris 8 University, France)
#104. Survey on Ontology learning from Web and open issues. Nesrine Ben Mustapha, and Hajer Baazaoui Zghal (University of Manouba, Tunisia), Marie-Aude Aufaure (Ecole Centrale Paris, France), and Henda Ben Ghezala (University of Manouba, Tunisia)
#107. An Exploratory Study of the Drivers of E-Business Value Creation in the Jordanian Banking Sector. Ali. A. Alawneh and Samer Hanna (Philadelphia University, Amman, Jordan)
#112. Evaluation Technique In The Spi-Calculus For Cryptographic Protocols. Hasan Al-Refai (Philadelphia University, Amman, Jordan